DocumentCode :
175316
Title :
Visualization of SSL Setting Status Such as the FQDN Mismatch
Author :
Suga, Yuji
Author_Institution :
Internet Initiative Japan Inc., Tokyo, Japan
fYear :
2014
fDate :
2-4 July 2014
Firstpage :
588
Lastpage :
593
Abstract :
In 2009, researchers released details of a vulnerability in the SSL and TLS protocols that could allow Man-in-the-Middle attacks to be carried out. IETF published countermeasures with unprecedented speed as RFC5746, however server-side implementations are not deployed because of problems in business such as the loss of opportunities and backward compatibilities. An efficient DOS attack tool using this vulnerability launched by hacker group. Also, an update that blocks RSA keys less than 1024 bits, which it is recognized should only be used by those understanding the risks involved distributed in August 2012. In November 2012, NISC published a concrete transitioning plan on government systems. Thus measures to be considered are present in the handling of SSL/TLS servers. We went crawling using SSLyze the status of measures above vulnerabilities. This paper also proposes visualization methods to understand the latest status and the statistics for geographical regions.
Keywords :
cryptographic protocols; data visualisation; public key cryptography; DOS attack tool; FQDN mismatch; RFC5746; RSA keys; SSL setting status visualization method; SSLyze; TLS protocols; geographical regions; government systems; man-in-the-middle attacks; Browsers; Educational institutions; Portals; Protocols; Public key; Servers; CRIME attacks; EFF SSL Observatory; RFC5746; Renegotiation function; SSL/TLS; SSLyze; Transition engineering; Transitioning of cryptographic algorithms;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on
Conference_Location :
Birmingham
Print_ISBN :
978-1-4799-4333-3
Type :
conf
DOI :
10.1109/IMIS.2014.88
Filename :
6975532
Link To Document :
بازگشت